The Security page of your account lets you view the SSH keys, SSL certificates, and security history of your account.

Personal access tokens for the DigitalOcean API and access keys for Spaces are generated and managed on the Applications and API page of the control panel.

SSH Keys

SSH keys provide a more secure way to log in to your Droplet. We recommend them for all users.

In this section, you can upload an SSH public key to your account and name it. Once you’ve added a key, you can select it during Droplet creation to automatically add it to new Droplets. You can also add SSH keys directly to existing Droplets.

For more detailed instructions, see our SSH key documentation:

Improve security when you log in by creating SSH keys and adding them to Droplets.
Use a terminal to connect to Droplets using OpenSSH or PuTTY for shell access to your remote server.


Some product features, like load balancer SSL termination and custom Spaces CDN endpoints, require SSL certificates. The certificates section of your account security page lets you manage the SSL certificates uploaded to your account.

You can use our Let’s Encrypt integration to create fully-managed SSL certificates. You can also manually upload custom certificates or certificates from a commercial certificate authority.

Learn more in our SSL certificate management documentation:

Some DigitalOcean services, like load balancer SSL termination and custom Spaces CDN endpoints, require SSL certificates. You can upload or create certificates during setup of the features that need them. You can also upload, create, and remove certificates at any time from your account settings page. In the Account section of the main menu, click Settings, then click the Security tab at the top of the page. The Certificates section lists information about any existing certificates, like their names, SHA1 fingerprints, and expiry dates.

Security History

The security history shows a record of actions that have been taken in your account, like user logins, resource creation and deletion, and password changes. It also includes the IP address of the device where the action originated and how long ago the action happened. Hover over the value in the Time column, like 1 month ago, to see the specific date and time of the event, like Fri, Nov 2 2018 at 3:31pm.

If you need data older than what is available in your security history, open a support ticket.